授權機制 的英文怎麼說

中文拼音 [shòuquánzhì]
授權機制 英文
enabling mechanism
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : machineengine
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 授權 : empower; authorize; warrant
  • 機制 : 1 (機器製造或加工的) machine processed; machine made 2 (機器的構造和工作原理; 有機體的構造、功...
  1. A united and fixed system of delegated legislation not having been set up, many differences existing, perfective terms not having been provided. they all make the practices of delegated legislation having many problems in delegated organs in granted organs and in rules of delegation

    由於我國沒有形成統一、固定的立法度,對立法基本問題理論爭議較大, 《立法法》對立法的規定不完善,使得我國立法實踐存在著種種問題,無論是在關、被關,還是法中都存在著不盡人意之處。
  2. A commonly agreed - upon method of negotiating authorization is also needed

    得到普遍遵守的協商授權機制也是很必要的。
  3. It also provides an authorization mechanism for a user by means of signed certificates

    它還通過簽名證書為用戶提供了授權機制
  4. In this thesis the attribute certificate authorization mechanism of the pmi is thoroughly investigated

    本文的主要工作便是對pmi系統中涉及的具體屬性證書授權機制進行深入的研究與探討。
  5. The first is a time - based authorization mechanism and the second is the ability to be further expanded by other macros and code

    第一個特性是基於時間的授權機制,第二個特性是能夠由其他宏和代碼進行進一步擴展。
  6. This is because resources have jndi names that can be looked up by any application, and there is no authorization on resource access

    這是因為資源具有jdni名稱,而此名稱可以由任何應用程序進行查詢,並且資源訪問上沒有授權機制
  7. Explicit authorization ( briefly ea ) mechanism has many excellent security properties and is capable of preventing information stealing and destroying attack

    顯式授權機制具備很好的安全性質,能有效地防禦信息竊取和破壞攻擊。
  8. Software system modeling is another key content of this dissertation, which incarnates the explicit authorization mechanism completely and definitely

    軟體系統的建模是這一部分的重點內容,它更加完整明確地體現了顯式授權機制的應用。
  9. The research of this dissertation focuses on constructing a trusted secure storage ( briefly tss ) system based on the ea mechanism and its simulating implementation

    本文在提出顯式授權機制的基礎上,構建了一種可信安全存儲系統tss ( trustedsecurestorage ) ,並對其進行了模擬實現。
  10. The time - based authorization mechanism is merely an example of how multiple types of constraints can be added in to this mechanism ; the expansion option will be used in a later example

    基於時間的授權機制只是作為例子,說明如何在這種中添加多種約束;擴展選項將在以後的例子中使用。
  11. 2. adopts the ca authentication mode, and combines the user certificate and role based access control, which enhances authentication and simplifies the way of access control

    採用了基於ca證書的身份認證方式,並將用戶證書和角色授權機制結合起來,既嚴格了身份認證又簡化了限管理。
  12. This paper has analyzed the pkix ( public key infrastructure based on x. 509 standard ) digital certificate authority mechanism, and has discussed the espkix, a platform independent and java implemented essential pkix, and its implementation. it covers the design thought in the phases of certificate request, issuance and revocation

    本文分析了基於x . 509標準的公鑰基礎設施( pkix )數字證書授權機制,對使用java語言設計和實現跨平臺的簡化版pkix ? espkix ( essentialpkix )進行了深入的討論,涉及espkix系統中證書的請求、頒發和撤消等各個階段。
  13. In the last part, a simple pmi privilege transaction model is proposed based on the authorization mechanism and its architecture components, system operation and some technical considerations in the design process are discussed. theories and implementation standards of pmi system have been further developed in this thesis, which is helpful to constructing a pki system with secure and efficient privilege management infrastructure

    本文通過對pmi屬性證書授權機制實現過程的設計和具體特處理模型的構建,進一步豐富和發展了pmi系統的相關理論和實施標準,為最終建立一個具備安全高效特管理普適性平臺的pki系統奠定了堅實的基礎。
  14. This paper emphasize on the research of security strategy of large rdb based on b / s three - tier system structure, and discuss of the data security management strategy from every side of account management, authority management, view management, rule management, audit monitor, data dictionary track. this paper, which use orient - object model designing idea, design and realize a common data security control of application system

    本論文側重研究基於b s三層體系結構下的大型關系數據庫的安全,從用戶管理、授權機制、靜態設置、角色管理、審計監控、數據跟蹤,多側面、多角度討論了數據安全管理策略,並且利用面向對象建模思想,在《龍口港信息系統》中構建並實現這種通用模型? ?數據庫安全控器dbsc的設計理念。
  15. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關訪問控框架及的相關理論設計並實現了鐵路信息系統安全框架中的數字證書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份認證和系統及應用系統安全框架和支持平臺。
  16. The traditional model of data access superiority management is introduced, points out that the static data access superiority management based on role is not integrated in a workflow management system, brings forward s new model of data access superiority management based on workflow, and describe its static authorization mechanism based on role

    摘要介紹了傳統的訪問控,指出了靜態的基於角色的訪問控在工作流管理系統中不能被直接套用,基於工作流的訪問控應採用靜態和動態控相結合的方式來解決,提出了其基於角色的靜態授權機制,靜態授權機制將基於角色的訪問控與工作流狀態變化有地聯系起來,在此基礎上可以方便地實現工作流管理系統中的訪問控
  17. It also supports the custom authorization module through the saml callout, so that the researchers and developers can develop their own authorization schema. based on the rbac and the attribute certificate, a new authorization schema based on the attribute certificate bas been advanced to resolve the shortcoming of the existing authorization schema

    本文針對網格環境對和訪問控的需求以及目前已經存在的網格和訪問控的不足之處,在分析了rbac模型和屬性證書的基礎上,設計並實現了基於屬性證書的網格授權機制
  18. Firstly, this dissertation discusses several essential theory issues of current information security technology. based on them, explicit authorization mechanism is put forward with accurate definition, formal model and demonstration of security properties. this part aims to describe this mechanism and its security in theory

    首先,本文討論了當前信息安全技術中存在的幾個本質上的理論難題,在此基礎上提出顯式授權機制,並給出了該的準確定義、形式化模型和安全性質的證明,從理論上描述了該以及該的安全性。
  19. Well - defined interfaces within the framework allow for the inclusion of multiple authentication technologies and authentication mechanisms without changing or interfering with any of the existing login services

    這個框架中定義良好的介面使得無需改變或者干擾任何現有的登錄服務就可以加入多種認證技術和授權機制
  20. In the aspect of implementation, first, we design a new cerp application software framework, which is based on mvc design pattern. this new framework inherit the primary virtue of the original cerp framework and inject some new speciality, such as extended authorization, custom deployed workflow control, task box and so on

    在實現方面,本文先採用mvc模式設計了新型cerp應用軟體框架的系統架構,它繼承了原cerp應用程序框架中的優點,加入了多種粒度的授權機制、自定義流程式控、任務盒以及數據庫連接池等新特性。
分享友人